Network infrastructure includes the firewalls, wireless networks, routers, switches, VPN, VoIP, IDS/IPS, and DLP which form the basis of any information system. As part of this service, we analyse the configuration of the corporate network infrastructure and its related processes in terms of information security, and also its efficiency.

This is an automated and manual analysis of applications which detects vulnerabilities. We use the most relevant methods and approaches for the analysis (including the OWASP Testing Guide, OSSTMM, WASC Threat Classification, and STRIDE), which enables the prevention to the greatest extent possible of the majority of potential attacks.